Columbia Technology Ventures

On-chip security circuit for protection against hardware tampering

This technology is a beacon circuit that provides security for hardware by alerting users to malicious tampering in the device’s design and fabrication.

Unmet Need: Method of securing hardware throughout design and fabrication

While computer security has traditionally been focused on software, the protection of hardware is also necessary for a completely secure system. Current methods of hardware security employ either a high-level design language as protection or aim to identify deviations on the manufactured chip through comparison to a “gold standard”. However, such methods fail to address the security of the entire process of hardware development from design through manufacturing.

The Technology: Protection of hardware against malicious tampering throughout design and fabrication

This technology describes a beacon circuit that provides hardware protection by alerting users to malicious tampering in the device’s design and fabrication. The beacon is integrated into the hardware itself and detects any changes in components or circuitry not intended by the user and provides alerts via unique power signature readouts. Considering that the circuit will be inoperable without the beacon, a foundry intending to insert malicious backdoors in the hardware will be unable to circumvent this security feature.

A prototype of the technology has been tested and its efficacy was verified for at least three hardware designs.

Applications:

  • Hardware security for microprocessor designers and manufacturers
  • Protection against IP theft
  • Protection for government agency hardware
  • Hardware memory security
  • Hardware security for mobile device and video game console components

Advantages:

  • Offers protection against tampering by foundries and manufacturers
  • Offers protection against backdoors inserted by third-party components
  • Does not require comparison of the hardware to a “gold standard” for validation of security
  • Uses confidential, customizable query signals for hardware auditing
  • Integrated into circuit design to ensure an inoperable circuit after tampering
  • Offers security for hardware at all levels of design and fabrication

Lead Inventor:

Simha Sethumadhavan, Ph.D.

Patent Information:

Patent Status

Related Publications:

Tech Ventures Reference: